Showing posts with label Cyber Law. Show all posts
Showing posts with label Cyber Law. Show all posts

it would have to be enacted by assembly as statutory solitude law.


A pen register is similar to a trap and trace device. A trap and trace device would show what numbers had called a specific telephone, i.e. all incoming phone numbers. A pen register rather would show what numbers a phone had called, i.e. all outgoing phone numbers. The two terms are often used in concert, especially in the context of Internet communications. They are often jointly referred to as "Pen Register or Trap and Trace devices," to reflect the fact that the same program will probably do both functions in the modern era, and the distinction is not that important. The term 'pen register' is often used to describe both pen registers and trap and trace devices.

Background
In Katz v. United States (1967), the United States Supreme Court recognized its "reasonable expectation of privacy" test. It overturned Olmstead v. United States and held that wiretaps were unconstitutional searches, because there was a reasonable expectation that the announcement would be private. The government was then required to get a warrant to execute a wiretap.
Ten years later the superlative Court held that a pen register is not a search because the "petitioner voluntarily conveyed numerical information to the telephone company." Smith v. Maryland, 442 U.S. 735, 744 (1979). Since the defendant had disclosed the dialed numbers to the telephone business so they could connect his call, he did not have a reasonable expectation of privacy in the numbers he dialed. The court did not differentiate between disclosing the numbers to a human worker or just the routine equipment used by the telephone company.
The Smith decision left pen registers completely outside constitutional protection. If there was to be any privacy protection, it would have to be enacted by assembly as statutory solitude law.

A device or process which records or decodes routing.


A device or process which records or decodes routing, addressing, or signalling information transmitted by an tool or facility from which a wire or electronic announcement is transmitted, make available, however, that such information shall not include the contents of any communication, but such term does not include any device or process used by a provider or customer of a wire or electronic announcement service for billing, or recording as an incident to billing, for communications services provided by such provider or any device or process used by a provider or client of a wire communication service for cost accounting or other like purposes in the ordinary course of its commerce.
This is the current definition of a Pen Register, as amended by way of the 2001 USA PATRIOT Act. The original statutory definition of a pen register was created in 1984 as part of the Electronic Communications Privacy Act, which defined a "Pen Register" as:
A device which proceedings or decodes electronic or other impulses which identify the numbers called or otherwise transmitted on the telephone line to which such device is dedicated.

Request of the Espionage Act of 1917


Request of the Espionage Act of 1917 has since its
original passage during World War I.  Adapting to fit the need to
protect national security during wartime and peacetime, the Act
applies to both American citizens and foreign nationals and
extends beyond the physical borders of the United States.  The
advent of computer technology, and perhaps even more
highly, the Internet, has created newer and faster modes of
intelligence acquisition, transfer, theft, communication, and
publication.  Courts have consistently apparent a line between the
person who leaks intelligence that threatens national security and
the person or institution that publishes the leaked intelligence that
threatens national security.  The equilibrium between national security
and freedom of the press has been respected, but when modern
technologies blur the line between leaking and publishing
classified data the balance can no longer be so maintain. The recent
Wick Leaks argument has highlighted the impact
of technology on application of the Espionage Act to publication of
sensitive government information.  As a foreign nationwide, Assuage
could still be subject to prosecution if the U.S. government could
show he acted as a communicator of dangerous national security
information rather than as a traditional associate of the pres.